Saturation Throughput of IEEE e EDCA Based on Mean Value Analysis

Size: px
Start display at page:

Download "Saturation Throughput of IEEE e EDCA Based on Mean Value Analysis"

Transcription

1 Saturation Throughput of IEEE 80.11e EDCA Based on Mean Value Analysis Yuxia Lin and Vincent W.S. Wong Department of Electrical and Computer Engineering The University of British Columbia 33 Main Mall, Vancouver, BC, Canada V6T 1Z4 {yuxial, Abstract The IEEE based wireless LANs have been widely deployed for local area high-speed data access. The IEEE 80.11e amendment aims at providing QoS provisioning to support real-time multimedia traffic in WLANs. The Enhanced Distributed Channel Access (EDCA) is a QoS extension of the Distributed Coordination Function (DCF) in IEEE 80.11a/b/g. In this paper, we propose an analytical model to evaluate the saturation throughput of the IEEE 80.11e EDCA. Our analytical model is based on the use of mean value analysis. We carry out extensive simulation study to validate the accuracy of the proposed model. Our scheme models accurately the effects of the change of contention window size and AIFS (Arbitration Inter- Frame Space). Our analytical model is applicable to real-time system tuning and on-line admission control algorithms which require a low computation complexity. I. INTRODUCTION Due to the simplicity in deployment and low cost, the IEEE based wireless LANs [1] have become the de facto standard for providing high-speed wireless Internet access to end users. IEEE Medium Access Control (MAC) specifies two main functions for random access: the contentionbased mechanism of Distributed Coordination Function (DCF) and the centralized mechanism of Point Coordination Function (PCF). DCF is simple and robust, and thus has been used in most commercial products. However, it provides no traffic differentiation, delay or throughput guarantees. Real-time flows may experience arbitrary delays when the network load is high due to the CSMA/CA mechanism. On the other hand, the PCF mechanism can provide a level of service guarantee by a central scheduling scheme, but it introduces additional complexity and protocol overhead. It also has some problems that may lead to poor QoS performance []. As a result, PCF is not widely deployed in the existing WLANs. Driven by the demand of supporting multimedia services on WLANs (such as voice, video and interactive games), the Task Group E in the IEEE committee has defined an extension to the IEEE standard which provides QoS features and multimedia support to the existing 80.11a/b/g standards while maintaining backward compatibility. The IEEE 80.11e standard [3] defines a new coordination function called the Hybrid Coordination Function (HCF) which includes a contention-based Enhanced Distributed Channel Access (EDCA) mode and a centralized HCF Controlled Channel Access (HCCA) mode. Due to the rapid deployment of WLANs based on IEEE DCF, throughput analysis of the contention-based DCF media access function has been extensively studied by using analytical or simulation methods. One widely used analytical model is proposed by Bianchi [4], which models the binary exponential backoff scheme of DCF with a two-dimensional Markov chain. With the popularity of the DCF in IEEE networks, EDCA is expected to be the dominating access scheme for IEEE 80.11e networks. As a result, performance evaluations of EDCA function have been conducted by using either simulation or analytical methods. Most of the proposed analytical models extend the Bianchi s Markov chain model to take into account the different Arbitration Inter-Frame Space (AIFS) and the different Contention Window (CW) sizes. However, these extensions are not trivial. The use of multi-dimensional Markov chains and other non-linear equations lead to higher computational complexity. It may not be possible to obtain real-time solutions for these equations. Thus, although some of these models provide good accuracy, the high computational complexity may prevent them from implementing in realtime control functions such as on-line call admission control algorithms in IEEE 80.11e networks. In this paper, we propose a simple and accurate analytical model to evaluate the saturation throughput for 80.11e EDCA access scheme. We extend the work by Tay and Chua [5] and use the mean value analysis. To the best of our knowledge, this is the first paper that utilizes the mean value analysis approach for saturation throughput evaluation in 80.11e networks. The proposed analytical model is simpler, and yet it maintains good accuracy. Our proposed analytical model is validated by extensive simulations. Results show that our model is accurate under a wide range of conditions (i.e., different number of stations, different contention window sizes and different AIFS values). Our model is applicable to the design of fast on-line algorithms such as system parameter tuning and call admission control in 80.11e networks. This paper is organized as follows. In Section II, we provide an overview of the new QoS access schemes in IEEE 80.11e, and describe the related work on saturation throughput analysis for DCF and 80.11e EDCA. In Section III, we describe our proposed analytical model. Section IV presents the results of the model validation by simulation. Conclusions

2 and future work are given in Section V. A. IEEE 80.11e II. BACKGROUND AND RELATED WORK IEEE 80.11e is a direct extension to the existing networks that provides QoS features and multimedia support, and at the same time, maintains full backward compatibility. It defines a Hybrid Coordination Function, which includes two access modes: a distributed EDCA mode and a centralized HCCA mode. EDCA provides a prioritized QoS service by enhancing the contention-based DCF function. Higher layer packets are classified into one of the four Access Categories (ACs) at the MAC layer. Each AC has its own queue and channel access parameters, which include the Arbitration Inter-frame Space (AIFS), minimum and maximum contention window sizes and Transmission Opportunity (TXOP) limits. The ACs gain different priority for channel access by differentiating these parameters. However, due to its probabilistic nature of channel access, EDCA cannot provide hard QoS guarantees such as strict delay bound. In order to provide parameterized QoS service, HCCA has been proposed as a centralized polling scheme to allocate guaranteed channel access to Traffic Streams based on their QoS requirements. During a beacon interval, a Hybrid Coordinator which is collocated with the QoS Access Point can access the wireless medium with its higher priority to initiate frame exchange sequences and to allocate TXOPs to itself and other stations, so as to provide limited-duration controlled access phase (CAP) for contention-free transfer of QoS data. The durations of TXOPs are calculated from the traffic specification (TSPEC), such as the mean/peak data rate and delay requirement announced at the beginning of the traffic flow. HCCA can be initiated during the Contention-free Period as well as the Contention Period. It is more flexible than PCF. With a good admission control and scheduling scheme, HCCA is able to provide guaranteed QoS services to network flows. However, compared with EDCA, HCCA still presents much challenge for its actual implementation due to its higher complexity and cost concerns. With DCF based 80.11a/b/g products dominating the market, EDCA is expected to be widely adopted as the multimedia solution to the based networks. As a result, we focus on EDCA in this paper. B. Previous Work in Performance Analysis of DCF and EDCA With the rapid deployment of the IEEE WLANs, there have been many studies of contention-based DCF medium access function. DCF uses the carrier sense multiple access/collision avoidance (CSMA/CA) scheme with binary exponential backoff. Most of the research work focused on the saturation throughput analysis, which is the maximum load that the system can carry in a saturation condition (i.e., the transmission queue of every station is assumed to be always nonempty). This is a fundamental performance figure as it indicates the limit of the network throughput when the offered traffic load increases. In addition to many simulation studies [6] [8], analytical models have been constructed for performance analysis. Among these works, Bianchi s model [4] has attracted lots of attention. It models a single station s backoff process with a two-dimensional Markov chain. Assuming that each transmission experiences identical and independent collision probability, it obtains the stationary probability for a station to transmit in a generic time slot. The saturation throughput is obtained by dividing the expected payload information transmitted in a time slot by the expected length of a time slot. This method provides a relatively accurate representation of DCF s binary exponential backoff process, and achieves good performance prediction. On the other hand, some parallel works derive the saturation throughput without fully describing the detailed behavior of the binary exponential backoff. Cali et al. [9] model the backoff process with a p-persistent model. The backoff interval is sampled from a geometric distribution with parameter p. They show that the p-persistent IEEE model closely approximates the standard protocol performance as long as the average backoff interval is the same. They also derive the optimal p value for maximizing the system capacity. Tay and Chua [5] further simplify the MAC modelling by using a mean value approach. Instead of studying the details of the stochastic process using Markov chain, their model tries to approximate the average value for a system variable wherever possible. This technique provides closed-form expressions for the collision probability and the saturation throughput, thus facilitating the analysis of the dependence of system performance on various parameters. The model validation shows that even though this model omits many system details, it still achieves good accuracy warranting its usefulness. There has been work reported in the literature for the performance of the EDCA function. Experimental testbeds [10] and numerous simulation tests [], [11] [13] have been carried out which show that EDCA is effective in traffic differentiation. Several analytical models have also been proposed for 80.11e EDCA. They extend the above DCF models to include the traffic differentiation features of EDCA. Most of the work extends the DCF Markov chain model proposed by Bianchi. Xiao [14] enlarges the original two-dimensional Markov chain to three-dimensional, and analyzes the effects of the different contention window sizes on throughput, but the AIFS-based priority scheme is not included. Kong et al. [15] use a three-dimensional Markov chain to fully describe the backoff behavior of each AC in each station so that both AIFS and CW are considered. Robinson et al. [16] keep the twodimensional Markov chain, but divide the contention periods into different zones to account for the different collision probabilities during different contention periods. Hui et al. [17] also divide backoff into several sub-periods and constructs a P-consistent CSMA/CA model. Ge and Hou [18] extend Cali s p-persistent DCF model to include multiple priority classes, but the mathematical model does not incorporate the AIFS differentiation proposed in IEEE 80.11e standard. One major obstacle for utilizing the analytical models

3 based on multi-dimensional Markov chain analysis is the high computation complexity of these models. Solving a set of non-linear equations by approximation may not be feasible in real-time. To better facilitate system design, such as deriving optimal call admission control or adaptive schemes, we need a mathematical model which is accurate and simple to implement (i.e., solutions can be obtained in real-time). The motivation of our work is to propose a simple and yet accurate analytical model. We achieve this by extending Tay and Chua s mean value DCF model to EDCA. By following the principle of average value approximation, we construct a model based on evaluating the average collision and transmission probability for each access category with different contention window size and AIFS. III. THE ANALYTICAL MODEL In our proposed model, we assume that there is a fixed number of stations in the network. Each station has saturated traffic with one access category. Though the following work can be generalized to four ACs as defined in the 80.11e standard, we focus our initial analysis on only two ACs. This avoids excessive formulation and makes the model easier to understand. We assume that there are N 1 stations with access category AC 1 traffic, and N stations with access category AC traffic. AC 1 is assumed to be the higher priority traffic. We also assume an ideal channel condition which does not have transmission errors or capture effect. TXOP limit is assumed to be 0, which allows only one frame exchange each time. The system time is considered to be slotted, and only basic access scheme is considered. For stochastic process analysis, people usually need to adopt assumptions, such as Markov memory and exponential distribution, to make the problem tractable. Network queueing and multi-access systems are especially complex to analyze; only very simplified and ideal protocols can be well analyzed [19]. In our problem, we formulate several simplifying assumptions in the model development to achieve a good trade-off between simplicity and accuracy. The simulation validation later will show that these approximations are good enough to give meaningful system predictions. A. Differentiation by Contention Window We first study the case when all ACs have the same AIFS value. The traffic priority differentiation is thus only realized through differentiating the contention window size. We assume that a packet for AC i (i = 1, ) transmitted in a time slot has a constant collision probability of p i. Each unsuccessful transmission will be re-tried until an acknowledgment is received. The number of transmissions experienced by each packet is then a geometric distribution with the probability of success 1 p i. The backoff timer starts with a value uniformly selected from 0 to W i, where W i is the minimum contention window size for AC i. The average backoff timer in the first stage is thus W i /. Each time a collision occurs, the contention window size will double until it reaches the maximum stage m i. The average number of backoff time slots experienced by a packet in AC i can be calculated as: W bi = (1 p i ) W i + p i(1 p i ) W i + +p m i i (1 p i ) mi W i = 1 p i p i (p i ) mi + p m i+1 i mi W i W i, i = 1, (1) 1 p i If we assume that AC i s packet has a constant probability of transmission in each idle slot, then the probability for AC i s packet to transmit in an idle time slot can be approximated as: τ i = 1/W bi, i = 1, () The probability that one transmitted packet by AC 1 will collide is the probability that any of the other (N 1 1) AC 1 stations or N AC stations also transmits: p 1 = 1 (1 τ 1 ) (N 1 1) (1 τ ) N (3) The same is true for the collision probability of AC s packet: p = 1 (1 τ 1 ) N1 (1 τ ) (N 1) (4) We can solve for p i and W bi from the above system of equations (1)-(4). To derive the saturation throughput for each AC i, we observe the system in a unit time period. The rate of transmission r xi is defined as the number of transmission attempts by AC i stations during this unit time period. The rate of successful transmission r si is defined as the number of successful transmissions by AC i stations. Due to the geometrical distribution of the number of transmission attempts per packet, the average number of transmissions per packet is 1/(1 p i ), which equals r xi /r si : 1 = r xi, i = 1, (5) 1 p i r si Each collision may involve multiple stations. To a first degree approximation, we assume that each collision involves only two stations. Thus, the rate of collision r ci, which is the number of collisions observed in the system in a unit time period, is given by: r ci = r xi r si, i = 1, (6) For AC i, we define T i as the time needed to finish a transmission cycle, which is the renewal period between two successive transmissions. T i includes the frame transmission time, an SIFS, the ACK transmission time, an AIFS and an average number of backoff time slots. We make an approximation to estimate the average number of backoff time slots experienced by each packet transmission. At saturation, all transmissions will be preceded with a mandatory backoff selected from the minimum contention window W i. If we omit the dependence between two ACs and only look at AC i stations, when N i stations uniformly choose a backoff counter

4 from 0 to W i, the separation between any two stations has an average of W i /(N i +1). The station with the smallest backoff counter may make the first transmission after W i /(N i + 1) slots of waiting. As an approximation, we have: T i = T frame + T SIF S + T ACK + T AIF S + W i N i + 1 T slot (7) The time taken by the successful and collision transmissions should sum up to one time unit: (r si + r ci )T i = 1 (8) i=1 It is reasonable to assume that the rate of transmission by each AC i is proportional to the number of stations in each AC i and the transmission probability by each AC i : r x1 = r x (9) N 1 τ 1 N τ Equations (5)-(9) give a system of linear equations about r xi and r si which can be solved in closed form: r x1 = K[(1 p 1 /)KT 1 + (1 p /)T ] 1 (10) r x = [(1 p 1 /)KT 1 + (1 p /)T ] 1 (11) r s1 = K(1 p 1 )[(1 p 1 /)KT 1 + (1 p /)T ] 1 (1) r s = (1 p )[(1 p 1 /)KT 1 + (1 p /)T ] 1 (13) where K = N 1 τ 1 /N τ The saturation throughput for AC i can be calculated as: S i = r si T p,i, i = 1, (14) where T p,i is the time used to transmit the frame payload information for an AC i packet. B. Differentiation by AIFS The previous modelling only considers the effects of the contention window size on the throughput differentiation. IEEE 80.11e standard also defines traffic differentiation by utilizing different AIFS. When we further take into account the different AIFS values for each access category, it is more challenging to design an effective mean value-based mathematical model. Since we assume that AC 1 is the higher priority access category, it is reasonable to assume that AIF S 1 AIF S. By the IEEE 80.11e standard [3], AIFS is calculated as AIF S i = SIF S + AIF SN i T slot, i = 1, (15) where T slot is the slot time and AIFSN is an integer with a typical value from 1 to 7. For simplicity, in the subsequent equations, we assume that AIF SN = AIF SN 1 + M (16) where M is a non-negative integer. The problem with introducing different AIFS values is that it may violate some of the assumptions we used before. During the (AIF S AIF S 1 ) time period, there is less contention for AC 1 traffic. The collision probability during this period may become lower. This violates the basic assumption that a packet belonging to one AC experiences identical collision probability in any time slot. Robinson et al. [16] solve the problem by dividing the transmission periods into two contention zones and calculating the different collision probabilities in each zone. Kong et al. [15] expand the Markov chain to three-dimensional to give a detailed representation of the priority access scheme. In order to follow the average value methodology, we assume that the collision probability for each access category is still identical in each slot time. This assumption is reasonable if M is small compared to CW min. In this case, the M time slots during which AC 1 has a smaller collision probability has less significance when we calculate the average probability. With this approximation, we can calculate the new average collision probability for each access category. Each time the wireless medium becomes idle, AC will wait M more time slots before counting down its backoff timer. To incorporate the effects of the difference in AIF S into the framework in the previous subsection, we consider these M extra time slots as some equivalent extra backoff time slots experienced by AC. With this consideration, we re-examine equation (1) to find the new average backoff time slots experienced by each access category s packet. The higher priority (AC 1 ) packet s average backoff slots (W b1 ) remains the same as expressed in equation (1). The effect of longer AIF S for AC is converted into AC s equivalently longer backoff time slots W b. To calculate the total number of time slots which an AC packet will experience due to its larger AIFS, we first estimate how many times an AC packet s backoff timer will be interrupted before counting down to zero. An extra M slots backoff time occurs every time the backoff timer is frozen due to sensing the busy medium. The probability that AC s backoff will be interrupted due to busy medium can be approximated with AC s conditional collision probability p. With an average backoff timer of W / in the first stage, it experiences an average of p W / interruptions. For each of these backoff timer interruptions, it incurs an extra backoff time slot of Mp W / compared to AC 1. Iteratively, these extra Mp W / backoff slots may introduce another p (Mp W /) timer interruptions, which lead to another extra Mp (Mp W /) = M p W / time slots. As a result, the effect of an extra M AIFS time slots for AC is approximately equivalent to increasing the average first stage backoff slots of AC from W / to: W + Mp W + M p W + + M k p k = W ( W + ) 1 1 Mp (17) The adjusted average backoff time slots for AC becomes W b = 1 p ( ) p (p ) m W 1 (18) 1 p 1 Mp

5 Note that the above equation is deduced from our assumption that M (the difference between AIF S 1 and AIF S ) is relatively small compared to CW min. Too large an M may well lead to 1 Mp < 0, which will invalidate this equation. By substituting W b as W b into the system of equations presented in Section III.A, we can obtain the solution for the saturation throughput prediction from equation (14). IV. MODEL VALIDATION BY SIMULATION In order to verify the validity of the proposed analytical model, we carry out extensive simulations using the ns- simulator [0]. The parameters used in the simulation are summarized in Table I. The network has one access point, N 1 stations with AC 1 traffic and N stations with AC traffic. All the stations are within transmission range of each other. Only basic access scheme is used. Each AC is backlogged with constant bit rate traffic. The packets have a fixed payload size of 100 bytes. Fig. 1. Throughput performance for symmetrically increasing load Basic Rate 1 Mbps Data Rate 11 Mbps DSSS PLCP Preamble and Header 19 bits MAC Header 19 bits FCS(Frame Check Sequence) 3 bits ACK Frame Size 11 bits Time Slot 0 µs SIFS 10 µs TABLE I SIMULATION PARAMETERS A. Effect of Contention Window Size Differentiation We first examine the effects of different contention window size on the saturation throughput. We set AIF SN 1 = AIF SN =, CW min1 = 15, m 1 =, and CW min = 31, m = for simulations in Figure 1 according to recommended default parameter settings in the 80.11e standard [3]. Figure 1 shows the aggregated saturation throughput when we symmetrically increase the number of stations in each AC from to 0. The aggregated throughput for each AC and the total network throughput from simulation and the analytical model are compared. As we can see that there is good agreement between the analytical and simulation results. Also, the aggregated saturation throughput decreases with increasing number of stations due to increased collision and backoff in the network. Figure shows the saturation throughput performance when the number of stations for each AC is asymmetrical in the network. The number of stations in AC 1 is fixed at N 1 = 5, but the number of stations in AC increases from to 0. CW min1 = 7 and CW min = 15 are used. Due to the asymmetry in the number of stations, we draw the figure using the throughput per station which is a more meaningful metric. Good prediction by the analytical model is also observed. We can also see that the per station throughput by the higher priority AC 1 significantly decreases due to the increased competition from the lower priority traffic, even though its own number of stations remains the same. Thus, some admission Fig.. Throughput performance for asymmetrically increasing load control mechanism is needed to protect the higher priority traffic s QoS performance from the lower priority traffic. Figure 3 shows the differentiation effect of contention window size on the saturation throughput by varying the CW min. In this test, N 1 = N = 10, m 1 = m =, CW min for AC 1 is fixed at 7, but the CW min for AC increases from 7 to 63. From the aggregated saturation throughput for each AC, we can clearly see the effectiveness of traffic differentiation by the minimum contention window size. Fig. 3. Differentiation effect of CWmin

6 wide range of conditions. Our proposed analytical model is applicable to real-time system tuning and on-line admission control algorithms which require a low computation complexity. For future work, we will continue to improve the accuracy of the model by relaxing more assumptions. We plan to extend the proposed model to determine the average packet delay. In addition, we will also apply the proposed model for call admission control in IEEE 80.11e EDCA networks. Fig. 5. Fig. 4. B. Effect of AIFS Differentiation Differentiation effect of AIFS Differentiation effect of AIFS and CWmin We study the sole effect of AIFS for traffic differentiation by setting the contention window size parameters to be the same for the two access categories and only varying the AIFS value. In this simulation, N 1 = N = 5, CW min1 = CW min = 31, m 1 = m =, AIF SN 1 =. AIF SN changes from to 5. The results are shown in Figure 4. Comparing Figure 3 and 4, we can see that AIFS has a more dramatic effect on traffic differentiation. Increasing AC s AIFS by one has almost the equivalent effect of doubling its CW min value. But setting AIFS difference to too large a value may lead to traffic starvation for low priority traffic. Figure 5 shows the combined differentiation effects of CW min and AIFS on the traffic. In this simulation, N 1 = N = 5, CW min1 = 31, CW min = 63, m 1 = m =, AIF SN 1 = and AIF SN increases from to 5. The results also show good prediction by the analytical model. V. CONCLUSIONS In this paper, we proposed a novel analytical model for saturation throughput evaluation of the IEEE 80.11e EDCA access mechanism. The proposed model is based on the use of mean value analysis. The distinct advantage of this model is a lower computational overhead when compared to other multi-dimensional Markov chain approaches. Although there is tradeoff between the model complexity and its accuracy, simulation results show that our model is accurate under a ACKNOWLEDGMENT This work is supported by the Natural Sciences and Engineering Research Council of Canada under grant number STPGP REFERENCES [1] IEEE WG, Part 11: Wireless LAN medium access control (MAC) and physical layer (PHY) specifications, [] Q. Ni, Performance analysis and enhancements for IEEE 80.11e wireless networks, IEEE Network, vol. 19, no. 4, pp. 1 7, July/Aug [3] IEEE WG, IEEE Std 80.11e-005 (Amendment to IEEE Std 80.11, 1999 Edition (Reaff 003), 005. [4] G. Bianchi, Performance analysis of the IEEE distributed coordination function, IEEE J. Select. Areas Commun., vol. 18, no. 3, pp , Mar [5] Y. Tay and K. Chua, A capacity analysis for the IEEE MAC protocol, Wireless Networks, vol. 7, no., pp , Mar [6] G. Bianchi, L. Fratta, and M. Oliveri, Performance evaluation and enhancement of the CSMA/CA MAC protocol for wireless LANs, in Proc. of IEEE PIMRC 96, Taipei, Taiwan, Oct. 1996, pp [7] B. P. Crow, I. Widjaja, J. G. Kim, and P. T. Sakai, IEEE wireless local area networks, IEEE Commun. Mag., vol. 35, no. 9, pp , Sept [8] J. Weinmiller, M. Schlager, A. Festag, and A. Wolisz, Performance study of access control in wireless LANs-IEEE DFWMAC and ETSI RES 10 HIPERLAN, Mobile Networks and Applications, vol., no. 1, pp , Mar [9] F. Cali, M. Conti, and E. Gregori, Dynamic tuning of the IEEE protocol to achieve a theoretical throughput limit, IEEE/ACM Trans. Networking, vol. 8, no. 6, pp , Dec [10] A. Banchs, A. Azcorra, C. Garcia, and R. Cuevas, Applications and challenges of the 80.11e EDCA mechanism: An experimental study, IEEE Network, vol. 19, no. 4, pp. 5 58, July/Aug [11] A. Lindgren, A. Almquist, and O. Schelen, Quality of service schemes for IEEE wireless LANs: an evaluation, Mobile Networks and Applications, vol. 8, no. 3, pp. 3 35, June 003. [1] S. Choi, J. D. Prado, S. Shankar, and S. Mangold, IEEE 80.11e contention-based channel access (EDCF) performance evaluation, in Proc. of IEEE ICC, Anchorage, Alaska, May 003, pp [13] D. He and C. Q. Shen, Simulation study of IEEE 80.11e EDCF, in Proc. of VTC, Jeju, Korea, Apr. 003, pp [14] Y. Xiao, Performance analysis of IEEE 80.11e EDCF under saturation condition, in Proc. of IEEE ICC, Paris, France, June 004, pp [15] Z. Kong, D. H. K. Tsang, and B. Bensaou, Performance analysis of IEEE 80.11e contention-based channel access, IEEE J. Select. Areas Commun., vol., no. 10, pp , Dec [16] J. W. Robinson and T. S. Randhawa, Saturation throughput analysis of IEEE 80.11e enhanced distributed coordination function, IEEE J. Select. Areas Commun., vol., no. 5, pp , June 004. [17] J. Hui and M. Devetsikiotis, Performance analysis of IEEE 80.11e EDCA by a unified model, in Proc. of IEEE Globecom, Dallas, Texas, Nov. 004, pp [18] Y. Ge and J. Hou, An analytical model for service differentiation in IEEE 80.11, in Proc. of IEEE ICC, Anchorage, Alaska, May 003, pp [19] D. Bertsekas and R. Gallager, Data networks, nd ed. Prentice Hall, 199. [0] Ns- simulator. [Online]. Available:

EVALUATION OF EDCF MECHANISM FOR QoS IN IEEE WIRELESS NETWORKS

EVALUATION OF EDCF MECHANISM FOR QoS IN IEEE WIRELESS NETWORKS MERL A MITSUBISHI ELECTRIC RESEARCH LABORATORY http://www.merl.com EVALUATION OF EDCF MECHANISM FOR QoS IN IEEE802.11 WIRELESS NETWORKS Daqing Gu and Jinyun Zhang TR-2003-51 May 2003 Abstract In this paper,

More information

An Analytical Model for the IEEE le EDCF

An Analytical Model for the IEEE le EDCF An Analytical Model for the IEEE 802.1 le EDCF Extended Abstract Zhifeng Tao, Shivendra S. Panwar Department of Electrical and Computer Engineering Polytechnic University Brooklyn, New York 11201 Abstract

More information

A Backoff Algorithm for Improving Saturation Throughput in IEEE DCF

A Backoff Algorithm for Improving Saturation Throughput in IEEE DCF A Backoff Algorithm for Improving Saturation Throughput in IEEE 80.11 DCF Kiyoshi Takahashi and Toshinori Tsuboi School of Computer Science, Tokyo University of Technology, 1404-1 Katakura, Hachioji, Tokyo,

More information

Notes on the Inefficiency of e HCCA

Notes on the Inefficiency of e HCCA Notes on the Inefficiency of 802.e HCCA C. Casetti, C.-F. Chiasserini, M. Fiore and M. Garetto Dipartimento di Elettronica, Politecnico di Torino - Italy E-mail: {casetti,chiasserini,fiore,garetto}@polito.it

More information

Saturated Throughput Analysis of IEEE e Using Two-Dimensional Markov Chain Model

Saturated Throughput Analysis of IEEE e Using Two-Dimensional Markov Chain Model Saturated Throughput Analysis of IEEE 80.e Using Two-Dimensional Markov Chain Model Lixiang Xiong and Guoqiang Mao School of Electrical and Information Engineering The University of Sydney NSW 006 Australia

More information

Mohammad Hossein Manshaei 1393

Mohammad Hossein Manshaei 1393 Mohammad Hossein Manshaei manshaei@gmail.com 1393 1 An Analytical Approach: Bianchi Model 2 Real Experimentations HoE on IEEE 802.11b Analytical Models Bianchi s Model Simulations ns-2 3 N links with the

More information

A Novel Framework for Radio Resource Management in IEEE Wireless LANs

A Novel Framework for Radio Resource Management in IEEE Wireless LANs Dublin Institute of Technology ARROW@DIT Conference papers Communications Network Research Institute 2005-01-01 A Novel Framework for Radio Resource Management in IEEE 802.11 Wireless LANs Mark Davis Dublin

More information

Providing Throughput Guarantees in IEEE e Wireless LANs

Providing Throughput Guarantees in IEEE e Wireless LANs Providing Throughput Guarantees in IEEE 802.11e Wireless LANs Albert Banchs a, Xavier Pérez-Costa a, Daji Qiao b a Network Laboratories, NEC Europe Ltd., Heidelberg, Germany b Real-Time Computing Laboratory,

More information

A Tool for Simulating IEEE e Contention-based Access

A Tool for Simulating IEEE e Contention-based Access A Tool for Simulating IEEE 802.11e Contention-based Access Andreas Floros 1 and Theodore Karoubalis 2 1 Dept. of Informatics, Ionian University, Plateia Tsirigoti 7, 49 100 Corfu, Greece floros@ionio.gr

More information

Performance Comparison of IEEE e EDCA and b DCF Under Non- Saturation Condition using Network Simulator

Performance Comparison of IEEE e EDCA and b DCF Under Non- Saturation Condition using Network Simulator Research Journal of Applied Sciences, Engineering and Technology 4(22): 4748-4754, 212 ISSN: 24-7467 Maxwell Scientific Organization, 212 Submitted: April 3, 212 Accepted: April 23, 212 Published: November

More information

Saturated Throughput Analysis of IEEE e EDCA

Saturated Throughput Analysis of IEEE e EDCA Saturated Throughput Analysis of IEEE 80.e EDCA Lixiang Xiong, Guoqiang Mao School of Electrical and Information Engineering The University of Sydney, Sydney, NW 006, Australia Abstract IEEE 80.e standard

More information

Call Admission Control for IEEE Contention Access Mechanism

Call Admission Control for IEEE Contention Access Mechanism Call Admission Control for IEEE 82.11 Contention Access Mechanism Dennis Pong and Tim Moors School of Electrical Engineering and Telecommunications, The University of New South Wales, Australia Email:

More information

A new Traffic Separation Mechanism (TSm) in Wireless e Networks: A simulation study

A new Traffic Separation Mechanism (TSm) in Wireless e Networks: A simulation study A new Traffic Separation Mechanism (TSm) in Wireless 802.11e Networks: A simulation study Ricardo Moraes 1, Francisco Vasques 1, Paulo Portugal 1, José Alberto Fonseca 2 1 Faculdade de Engenharia Universidade

More information

Wireless Networked Systems

Wireless Networked Systems Wireless Networked Systems CS 795/895 - Spring 2013 Lec #6: Medium Access Control QoS and Service Differentiation, and Power Management Tamer Nadeem Dept. of Computer Science Quality of Service (802.11e)

More information

Fair and Effective Transmissions in IEEE e WLAN

Fair and Effective Transmissions in IEEE e WLAN GESTS Int l Trans. Computer Science and Engr., Vol.19, No.1 17 Fair and Effective Transmissions in IEEE 802.11e WLAN Seongcheol Kim 1 and Jinoo Joung 1 1 Software School, Sangmyung University, Seoul, Korea

More information

A Hybrid Distributed Coordination Function for Scalability and Inter-operability in Large-scale WLANs

A Hybrid Distributed Coordination Function for Scalability and Inter-operability in Large-scale WLANs A Hybrid Distributed Coordination Function for Scalability and Inter-operability in Large-scale WLANs Nakjung Choi, Seongil Han, Yongho Seok, Yanghee Choi and Taekyoung Kwon School of Computer Science

More information

Collision Probability in Saturated IEEE Networks

Collision Probability in Saturated IEEE Networks in Saturated IEEE 80.11 Networks Hai L. Vu Centre for Advanced Internet Architectures (CAIA) ICT Faculty, Swinburne University of Technology Hawthorn, VIC 31, Australia h.vu@ieee.org Taka Sakurai ARC Special

More information

A Comparative Analysis on Backoff Algorithms to Optimize Mobile Network

A Comparative Analysis on Backoff Algorithms to Optimize Mobile Network Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 7, July 2014, pg.771

More information

COLLISION-AWARE ADAPTION OF CONTENTION WINDOW IN E WIRELESS LAN

COLLISION-AWARE ADAPTION OF CONTENTION WINDOW IN E WIRELESS LAN COLLISION-AWARE ADAPTION OF CONTENTION WINDOW IN 802.11E WIRELESS LAN Shih-Wei Pan, Jung-Shyr Wu and Ming-Wei You Department of Communication Engineering, National Central University, JhungLi City, Taiwan

More information

Collision Free Hybrid Slot Protocol for Improving Performance in Wireless Networks

Collision Free Hybrid Slot Protocol for Improving Performance in Wireless Networks International Journal of Engineering Research and Technology. ISSN 0974-3154 Volume 11, Number 8 (2018), pp. 1285-1300 International Research Publication House http://www.irphouse.com Collision Free Hybrid

More information

Fairness and Transmission Opportunity Limit in IEEE802.11e Enhanced Distributed Channel Access

Fairness and Transmission Opportunity Limit in IEEE802.11e Enhanced Distributed Channel Access Fairness and Transmission Opportunity Limit in IEEE802.11e Enhanced Distributed Channel Access by Anni Matinlauri Instructor: Jouni Karvo Supervisor: Professor Raimo Kantola Agenda Background Research

More information

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology CSC344 Wireless and Mobile Computing Department of Computer Science COMSATS Institute of Information Technology Wireless Local Area Networks (WLANs) Part I Almost all wireless LANs now are IEEE 802.11

More information

Performance Analysis of IEEE e EDCA with QoS Enhancements through TXOP based Frameconcatenation

Performance Analysis of IEEE e EDCA with QoS Enhancements through TXOP based Frameconcatenation Performance Analysis of IEEE 802.11e EDCA with QoS Enhancements through TXOP based Frameconcatenation and Block-acknowledgement Abstract Pradyot Kanti Hazra, Associate Professor, Asok De, Professor Department

More information

Project Report: QoS Enhancement for Real-Time Traffic in IEEE WLAN

Project Report: QoS Enhancement for Real-Time Traffic in IEEE WLAN Project Report: QoS Enhancement for Real-Time Traffic in IEEE802.11 WLAN Abstract A key issue in IEEE802.11 WLAN MAC is how to provide QoS support, especially for time-bounded traffic. Although much work

More information

Converging Voice, Video and Data in WLAN with QoS Support

Converging Voice, Video and Data in WLAN with QoS Support Research Online ECU Publications Pre. 211 28 Converging Voice, Video and Data in WLAN with QoS Support Hushairi Zen Daryoush Habibi Justin Wyatt Iftekhar Ahmad 1.119/WOCN.28.4542485 This article was originally

More information

CHAPTER 4 CALL ADMISSION CONTROL BASED ON BANDWIDTH ALLOCATION (CACBA)

CHAPTER 4 CALL ADMISSION CONTROL BASED ON BANDWIDTH ALLOCATION (CACBA) 92 CHAPTER 4 CALL ADMISSION CONTROL BASED ON BANDWIDTH ALLOCATION (CACBA) 4.1 INTRODUCTION In our previous work, we have presented a cross-layer based routing protocol with a power saving technique (CBRP-PS)

More information

Modeling of Partially Overlapping Wireless Personal Area Networks

Modeling of Partially Overlapping Wireless Personal Area Networks Modeling of Partially Overlapping Wireless Personal Area Networks 21. ComNets-Workshop Mobil- und Telekommunikation Dipl.-Ing. Holger Rosier March 16, 2012 ComNets Research Group RWTH Aachen University,

More information

Exploiting Multi-User Diversity in Wireless LANs with Channel-Aware CSMA/CA

Exploiting Multi-User Diversity in Wireless LANs with Channel-Aware CSMA/CA Exploiting Multi-User Diversity in Wireless LANs with Channel-Aware CSMA/CA Xiaowei Wang, Mahsa Derakhshani, Tho Le-Ngoc Department of Electrical & Computer Engineering, McGill University, Montreal, QC,

More information

IEEE p Performance Evaluation and Protocol Enhancement

IEEE p Performance Evaluation and Protocol Enhancement IEEE 8.11p Performance Evaluation and Protocol Enhancement Yi Wang, Akram Ahmed, Bhaskar Krishnamachari and Konstantinos Psounis Viterbi School of Engineering University of Southern California Los Angeles,

More information

Performance Analysis of Grouping Strategy for Dense IEEE Networks

Performance Analysis of Grouping Strategy for Dense IEEE Networks Performance Analysis of Grouping Strategy for Dense IEEE 802.11 Networks Lei Zheng *, Lin Cai *, Jianping Pan *, and Minming Ni *+ * University of Victoria, Victoria, BC, Canada + Beijing Jiaotong University,

More information

Using Dynamic PCF to Improve the Capacity for VoIP Traffic in IEEE Networks

Using Dynamic PCF to Improve the Capacity for VoIP Traffic in IEEE Networks Using Dynamic PCF to Improve the Capacity for VoIP Traffic in IEEE 802.11 Networks Takehiro Kawata NTT Email: kawata.takehiro@lab.ntt.co.jp Sangho Shin, Andrea G. Forte Henning Schulzrinne Columbia University

More information

Understanding e contention-based prioritization mechanisms and their coexistence with legacy stations

Understanding e contention-based prioritization mechanisms and their coexistence with legacy stations Understanding 802.11e contention-based prioritization mechanisms and their coexistence with legacy 802.11 stations Giuseppe Bianchi (+), Ilenia Tinnirello ( ), Luca Scalia ( ) (+) Università degli Studi

More information

ECE442 Communications Lecture 3. Wireless Local Area Networks

ECE442 Communications Lecture 3. Wireless Local Area Networks ECE442 Communications Lecture 3. Wireless Local Area Networks Husheng Li Dept. of Electrical Engineering and Computer Science Spring, 2014 Wireless Local Networks 1 A WLAN links two or more devices using

More information

Prioritization scheme for QoS in IEEE e WLAN

Prioritization scheme for QoS in IEEE e WLAN Prioritization scheme for QoS in IEEE 802.11e WLAN Yakubu Suleiman Baguda a, Norsheila Fisal b a,b Department of Telematics & Communication Engineering, Faculty of Electrical Engineering Universiti Teknologi

More information

Enhanced Controlled-Access and Contention-Based Algorithms for IEEE e Wireless LANs

Enhanced Controlled-Access and Contention-Based Algorithms for IEEE e Wireless LANs Enhanced Controlled-Access and Contention-Based Algorithms for IEEE 82.11e Wireless LANs Yaser Pourmohammadi Fallah and Hussein M. Alnuweiri Dept. of Electrical Engineering, University of British Columbia,

More information

Certified Wireless Network Administrator (CWNA) PW Chapter Medium Access. Chapter 8 Overview

Certified Wireless Network Administrator (CWNA) PW Chapter Medium Access. Chapter 8 Overview Certified Wireless Network Administrator (CWNA) PW0-105 Chapter 8 802.11 Medium Access Chapter 8 Overview CSMA/CA vs. CSMA/CD Distributed Coordination Function (DCF) Point Coordination Function (PCF) Hybrid

More information

An Efficient Scheduling Scheme for High Speed IEEE WLANs

An Efficient Scheduling Scheme for High Speed IEEE WLANs An Efficient Scheduling Scheme for High Speed IEEE 802.11 WLANs Juki Wirawan Tantra, Chuan Heng Foh, and Bu Sung Lee Centre of Muldia and Network Technology School of Computer Engineering Nanyang Technological

More information

IEEE e QoS for Wireless LAN:

IEEE e QoS for Wireless LAN: IEEE 802.11e QoS for Wireless LAN: A Research Direction James Yu 12/09/2003 TDC Network Seminar 1 IEEE 802.11 MAC Layer Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA) Different from CAMA/CD

More information

On the Performance Enhancement of Wireless LAN - A Multi-polling Mechanism with Hidden Terminal Solution

On the Performance Enhancement of Wireless LAN - A Multi-polling Mechanism with Hidden Terminal Solution MITSUBISHI ELECTRIC RESEARCH LABORATORIES http://www.merl.com On the Performance Enhancement of Wireless LAN - A Multi-polling Mechanism with Hidden Terminal Solution Yue Fang, Daqing Gu, A. Bruce McDonald,

More information

Analysis of the IEEE e EDCA Under Statistical Traffic

Analysis of the IEEE e EDCA Under Statistical Traffic Analysis of the IEEE 82.11e EDCA Under tatistical Traffic Juki Wirawan Tantra, Chuan Heng Foh Centre for Multimedia and Network Technology chool of Computer Engineering Nanyang Technological University

More information

PLUS-DAC: An Admission Control Scheme for IEEE e Wireless LANs

PLUS-DAC: An Admission Control Scheme for IEEE e Wireless LANs PLUS-DAC: An Admission Control Scheme for IEEE 802.11e Wireless LANs KIRAN KUMAR GAVINI Kanwal Rekhi School of Information Technology Indian Institute of Technology, Bombay M Tech. Project Presentation

More information

Two-Tier WBAN/WLAN Healthcare Networks; Priority Considerations

Two-Tier WBAN/WLAN Healthcare Networks; Priority Considerations Two-Tier WBAN/WLAN Healthcare Networks; Priority Considerations Saeed Rashwand Department of Computer Science University of Manitoba Jelena Mišić Department of Computer Science Ryerson University Abstract

More information

Supporting Deadline Monotonic Policy over Average Service Time Analysis

Supporting Deadline Monotonic Policy over Average Service Time Analysis Supporting Deadline Monotonic Policy over 802. Average Service Time Analysis Inès El Korbi Ecole Nationale des Sciences de l Informatique Laboratoire Cristal Université de la Manouba, 200 Tunisia ines.korbi@gmail.com

More information

Modeling and Analysis of TCP Dynamics over IEEE WLAN

Modeling and Analysis of TCP Dynamics over IEEE WLAN Modeling and Analysis of TCP Dynamics over IEEE 8. WLAN Jeonggyun Yu and Sunghyun Choi School of Electrical Engineering and INMC Seoul National University, Seoul, Korea Email: jgyu@mwnl.snu.ac.r and schoi@snu.ac.r

More information

Analysis of IEEE e for QoS Support in Wireless LANs

Analysis of IEEE e for QoS Support in Wireless LANs Analysis of IEEE 802.11e for QoS Support in Wireless LANs Stefan Mangold, Sunghyun Choi, Guido R. Hiertz, Ole Klein IEEE Wireless Communications, December 2003 Presented by Daeseon Park, Student No.2005-30231

More information

Adaptive Fair Channel Allocation for QoS Enhancement in IEEE Wireless LANs

Adaptive Fair Channel Allocation for QoS Enhancement in IEEE Wireless LANs Adaptive Fair Channel Allocation for QoS Enhancement in IEEE 82.11 Wireless LANs Mohammad Malli, Qiang Ni, Thierry Turletti, Chadi Barakat Projet Planète, INRIA-Sophia Antipolis, France E-mail: mmalli,

More information

Dynamic IEEE : Design, Modeling and Performance Evaluation

Dynamic IEEE : Design, Modeling and Performance Evaluation Dynamic IEEE 82.11: Design, Modeling and Performance Evaluation Federico Calì, Marco Conti, and Enrico Gregori CNUCE, Institute of National Research Council Via Alfieri 1-56127 Pisa - Italy {Marco.Conti,

More information

. 14 Byte for Acks. Due to this fact, the overhead is more relevant if the data contained in packets is sent to high rates:

. 14 Byte for Acks. Due to this fact, the overhead is more relevant if the data contained in packets is sent to high rates: QoS in IEEE 802.11 Issues Some issues are important for quality of service: the first one mentioned is the difference of performances expired by nodes based on their position in the network. Indeed, considering

More information

Optimal CWmin Selection for Achieving Proportional Fairness in Multi-Rate e WLANs: Test-bed Implementation and Evaluation

Optimal CWmin Selection for Achieving Proportional Fairness in Multi-Rate e WLANs: Test-bed Implementation and Evaluation Optimal CWmin Selection for Achieving Proportional Fairness in Multi-Rate 80.11e WLANs: Test-bed Implementation and Evaluation Vasilios A. Siris and George Stamatakis Institute of Computer Science, FORTH

More information

A Novel Contention Window Control Scheme Based on a Markov Chain Model in Dense WLAN Environment

A Novel Contention Window Control Scheme Based on a Markov Chain Model in Dense WLAN Environment 05 Third International Conference on Artificial Intelligence, Modelling and Simulation A Novel Contention Window Control Scheme Based on a Markov Chain Model in Dense WLAN Environment Yoshiaki Morino,

More information

Analysis of Throughput and Energy Efficiency in the IEEE Wireless Local Area Networks using Constant backoff Window Algorithm

Analysis of Throughput and Energy Efficiency in the IEEE Wireless Local Area Networks using Constant backoff Window Algorithm International Journal of Computer Applications (975 8887) Volume 6 No.8, July Analysis of Throughput and Energy Efficiency in the IEEE 8. Wireless Local Area Networks using Constant backoff Window Algorithm

More information

Performance Evaluation of IEEE e

Performance Evaluation of IEEE e Performance Evaluation of IEEE 802.11e 1 Sandeep Kaur, 2 Dr. Jyotsna Sengupta 1,2 Dept. of Computer Science, Punjabi University, Patiala, India Abstract Providing QoS requirements like good throughput

More information

Optimized WLAN MAC Protocol for Multimedia Applications

Optimized WLAN MAC Protocol for Multimedia Applications Research Online ECU Publications Pre. 2011 2008 Optimized WLAN MAC Protocol for Multimedia Applications Hushairi Zen Daryoush Habibi Alexander Rassau Iftekhar Ahmad 10.1109/WOCN.2008.4542484 This article

More information

Department of Electrical and Computer Systems Engineering

Department of Electrical and Computer Systems Engineering Department of Electrical and Computer Systems Engineering Technical Report MECSE-6-2006 Medium Access Control (MAC) Schemes for Quality of Service (QoS) provision of Voice over Internet Protocol (VoIP)

More information

Fairness Enhancement Scheme for Multimedia Applications in IEEE e Wireless LANs

Fairness Enhancement Scheme for Multimedia Applications in IEEE e Wireless LANs Fairness Enhancement Scheme for Multimedia Applications in IEEE 802.11e Wireless LANs Young-Woo Nam, Sunmyeng Kim, and Si-Gwan Kim Department of Computer Software Engineering Kumoh National Institute of

More information

Dynamic Admission Control in IEEE e EDCA-based Wireless Home Network

Dynamic Admission Control in IEEE e EDCA-based Wireless Home Network This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE CCNC 2006 proceedings. Dynamic Admission Control in IEEE 802.11e

More information

Performance analysis of Internet applications over an adaptive IEEE MAC architecture

Performance analysis of Internet applications over an adaptive IEEE MAC architecture Journal of the Franklin Institute 343 (2006) 352 360 www.elsevier.com/locate/jfranklin Performance analysis of Internet applications over an adaptive IEEE 802.11 MAC architecture Uthman Baroudi, Mohammed

More information

Numerical Analysis of IEEE Broadcast Scheme in Multihop Wireless Ad Hoc Networks

Numerical Analysis of IEEE Broadcast Scheme in Multihop Wireless Ad Hoc Networks Numerical Analysis of IEEE 802.11 Broadcast Scheme in Multihop Wireless Ad Hoc Networks Jong-Mu Choi 1, Jungmin So 2, and Young-Bae Ko 1 1 School of Information and Computer Engineering Ajou University,

More information

B. Bellalta Mobile Communication Networks

B. Bellalta Mobile Communication Networks IEEE 802.11e : EDCA B. Bellalta Mobile Communication Networks Scenario STA AP STA Server Server Fixed Network STA Server Upwnlink TCP flows Downlink TCP flows STA AP STA What is the WLAN cell performance

More information

QoS Enhancement in IEEE Wireless Local Area Networks

QoS Enhancement in IEEE Wireless Local Area Networks MERL A MITSUBISHI ELECTRIC RESEARCH LABORATORY http://www.merl.com QoS Enhancement in IEEE802.11 Wireless Local Area Networks Daqing Gu and Jinyun Zhang TR-2003-67 July 2003 Abstract In this article, a

More information

Performance evaluation of IEEE e

Performance evaluation of IEEE e IJCSNS International Journal of Computer Science and Network Security, VOL.11 No.7, July 2011 159 Performance evaluation of IEEE 802.11e Sandeep kaur 1, Dr.jyotsna sengupta 2 Department of Computer Science,

More information

AGOOD medium access control (MAC) protocol for wireless

AGOOD medium access control (MAC) protocol for wireless IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 3, NO. 3, MAY 2004 793 Design of MAC Protocols With Fast Collision Resolution for Wireless Local Area Networks Younggoo Kwon, Yuguang Fang, Senior Member,

More information

Performance analysis of Admission Control for WLAN Networks in ad hoc mode

Performance analysis of Admission Control for WLAN Networks in ad hoc mode Performance analysis of Admission Control for 802.11 WLAN Networks in ad hoc mode Georgios S. Paschos, Ioannis Papapanagiotou, Efstathios D. Vagenas and Stavros A. Kotsopoulos School of Electrical and

More information

Adaptive EDCF: Enhanced Service Differentiation for IEEE Wireless Ad-Hoc Networks

Adaptive EDCF: Enhanced Service Differentiation for IEEE Wireless Ad-Hoc Networks Adaptive : Enhanced Service Differentiation for IEEE 82.11 Wireless Ad-Hoc Networks Lamia Romdhani, Qiang Ni, and Thierry Turletti INRIA Sophia Antipolis, 24 Route des Lucioles, BP-93, 692 Sophia Antipolis,

More information

Efficient Transmission of H.264 Video over WLANs

Efficient Transmission of H.264 Video over WLANs Efficient Transmission of H.264 Video over WLANs Yaser P. Fallah March 2007 UBC 1 Multimedia Communications Multimedia applications are becoming increasingly popular Video on mobile devices (cell phones,

More information

Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE networks

Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE networks Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE 802.11 networks Christos Chousidis, Rajagopal Nilavalan School of Engineering and Design Brunel University London, UK {christos.chousidis,

More information

Fairness Provision in the IEEE e. Infrastructure Basic Service Set

Fairness Provision in the IEEE e. Infrastructure Basic Service Set Fairness Provision in the IEEE 802.11e 1 Infrastructure Basic Service Set arxiv:0704.1842v2 [cs.oh] 13 Sep 2007 Feyza Keceli, Inanc Inan, and Ender Ayanoglu Center for Pervasive Communications and Computing

More information

IEEE Protocol: Design and Performance Evaluation of an Adaptive Backoff Mechanism

IEEE Protocol: Design and Performance Evaluation of an Adaptive Backoff Mechanism 1774 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 18, NO. 9, SEPTEMBER 2000 IEEE 802.11 Protocol: Design and Performance Evaluation of an Adaptive Backoff Mechanism Federico Calì, Marco Conti,

More information

WLAN Performance Aspects

WLAN Performance Aspects Mobile Networks Module C- Part 1 WLAN Performance Aspects Mohammad Hossein Manshaei Jean-Pierre Hubaux http://mobnet.epfl.ch 1 Performance Evaluation of IEEE 802.11(DCF) Real Experimentations HoE on IEEE

More information

Dynamic Traffic Prioritization and TXOP Allocation in e Based Multihop Wireless Networks

Dynamic Traffic Prioritization and TXOP Allocation in e Based Multihop Wireless Networks IJCSNS International Journal of Computer Science and Network Security, VOL.12 No.2, February 2012 33 Dynamic Traffic Prioritization and TXOP Allocation in 802.11e Based Multihop Wireless Networks Dongho

More information

Performance anomaly of b

Performance anomaly of b Laboratoire LSR Logiciels Systèmes Réseaux Software, Systems, Networks Performance anomaly of 802.11b Andrzej Duda LSR-IMAG Andrzej.Duda@imag.fr Joint work with Martin Heusse, Franck Rousseau, Gilles Berger-Sabbatel

More information

Wireless Communication

Wireless Communication Wireless Communication Systems @CS.NCTU Lecture 9: MAC Protocols for WLANs Instructor: Kate Ching-Ju Lin ( 林靖茹 ) 1 Reference 1. A Technical Tutorial on the IEEE 802.11 Protocol By Pablo Brenner online:

More information

Mobile & Wireless Networking. Lecture 7: Wireless LAN

Mobile & Wireless Networking. Lecture 7: Wireless LAN 192620010 Mobile & Wireless Networking Lecture 7: Wireless LAN [Schiller, Section 7.3] [Reader, Part 6] [Optional: "IEEE 802.11n Development: History, Process, and Technology", Perahia, IEEE Communications

More information

Time-Division Access Priority in CSMA/CA

Time-Division Access Priority in CSMA/CA Time-Division Access Priority in CSMA/CA Andrea Vesco Control and Computer Engineering Department Politecnico di Torino Torino, Italy Email andrea.vesco@polito.it Riccardo Scopigno Networking Lab Istituto

More information

A Performance Investigation of the Modified PCF with Priority Scheme

A Performance Investigation of the Modified PCF with Priority Scheme 2 ECTI TRANSACTIONS ON ELECTRICAL ENG., ELECTRONICS, AND COMMUNICATIONS VOL.3, NO.1 FEBRUARY 2005 A Performance Investigation of the Modified with Priority Scheme Apichan Kanjanavapastit 1 and Bjorn Landfeldt

More information

QoS issues in Wi-Fi-WMM based triple play home networks

QoS issues in Wi-Fi-WMM based triple play home networks QoS issues in Wi-Fi-WMM based triple play home networks Yun Tao Shi Jean-Marie Bonnin Gilles Straub Thomson, France INRIA/IRISA, France Thomson, France yun-tao.shi@thomson.net jm.bonnin@enst-bretagne.fr

More information

ENSC-894 Communication Networks Spring Analysis of Enhanced Distributed Channel Access (EDCA) in Wireless LAN using OPNET.

ENSC-894 Communication Networks Spring Analysis of Enhanced Distributed Channel Access (EDCA) in Wireless LAN using OPNET. ENSC-894 Communication Networks Spring 2014 Analysis of Enhanced Distributed Channel Access (EDCA) in Wireless LAN using OPNET. Team #2 Syed, Aitizaz Uddin (asyed@sfu.ca) Shen, Shiou-Min (eshen@sfu.ca)

More information

AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS

AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE 802.11 NETWORKS Marek Natkaniec, Andrzej R. Pach Department of Telecommunications University of Mining and Metallurgy al. Mickiewicza 30, 30-059 Cracow

More information

Lecture 16: QoS and "

Lecture 16: QoS and Lecture 16: QoS and 802.11" CSE 123: Computer Networks Alex C. Snoeren HW 4 due now! Lecture 16 Overview" Network-wide QoS IntServ DifServ 802.11 Wireless CSMA/CA Hidden Terminals RTS/CTS CSE 123 Lecture

More information

A Beacon-Based Collision-Free Channel Access Scheme for IEEE WLANs

A Beacon-Based Collision-Free Channel Access Scheme for IEEE WLANs Wireless Pers Commun (2014) 75:155 177 DOI 10.1007/s11277-013-1353-z A Beacon-Based Collision-Free Channel Access Scheme for IEEE 802.11 WLANs M. F. Tuysuz H. A. Mantar Published online: 27 August 2013

More information

IEEE e Enhanced QoS

IEEE e Enhanced QoS IEEE 802.11e Enhanced QoS 國立中興大學資工系曾學文 Tel : (04)22840497 ext 908 E-mail: hwtseng@nchu.edu.tw Outlines Introduction Traffic Differentiation Hybrid Coordination Function (HCF) Contention-Based Channel Access

More information

Reliable Multicast Scheme Based on Busy Signal in Wireless LANs

Reliable Multicast Scheme Based on Busy Signal in Wireless LANs Journal of Modern Science and Technology Vol.2 No.1 March 2014. Pp.18-25 Reliable Multicast Scheme Based on Busy Signal in Wireless LANs Sunmyeng For unicast transmissions, the IEEE 802.11 WLAN MAC (Medium

More information

Comparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function

Comparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function Comparison of pre-backoff and post-backoff procedures for IEEE 802.11 distributed coordination function Ping Zhong, Xuemin Hong, Xiaofang Wu, Jianghong Shi a), and Huihuang Chen School of Information Science

More information

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks First Author A.Sandeep Kumar Narasaraopeta Engineering College, Andhra Pradesh, India. Second Author Dr S.N.Tirumala Rao (Ph.d)

More information

MAC LEVEL BASED QUALITY OF SERVICE MANAGEMENT IN IEEE NETWORKS

MAC LEVEL BASED QUALITY OF SERVICE MANAGEMENT IN IEEE NETWORKS BULETINUL INSTITUTULUI POLITEHNIC DIN IAŞI Publicat de Universitatea Tehnică Gheorghe Asachi din Iaşi Tomul LVII (LXI), Fasc. 4, 2011 SecŃia ELECTROTEHNICĂ. ENERGETICĂ. ELECTRONICĂ MAC LEVEL BASED QUALITY

More information

Quality of Service (QoS) Settings on AP541N Access Point

Quality of Service (QoS) Settings on AP541N Access Point Quality of Service (QoS) Settings on AP541N Access Point Objective Quality of Service (QoS) is a technique used to achieve better performance for a computer network and is also used to enhance the quality

More information

Cooperative Communication Protocol based on Relay Node Grouping in Wireless Networks

Cooperative Communication Protocol based on Relay Node Grouping in Wireless Networks Cooperative Communication Protocol based on Relay Node Grouping in Wireless Networks Sunmyeng Kim Department of Computer Software Engineering, Kumoh National Institute of Technology 1 Daehak-ro, Gumi,

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?

More information

Experimental Framework and Simulator for the MAC of Power-Line Communications

Experimental Framework and Simulator for the MAC of Power-Line Communications Experimental Framework and Simulator for the MAC of Power-Line Communications Technical Report Christina Vlachou EPFL, Switzerland christinavlachou@epflch Julien Herzen EPFL, Switzerland julienherzen@epflch

More information

QoS Support for Time-Constrained Multimedia Communications in IEEE WLANs: A Performance Evaluation

QoS Support for Time-Constrained Multimedia Communications in IEEE WLANs: A Performance Evaluation QoS Support for Time-Constrained Multimedia Communications in IEEE 8. WLANs: A Performance Evaluation José Villalón Francisco Micó Pedro Cuenca Luis Orozco-Barbosa Department of Computer Engineering, Universidad

More information

IEEE Throughput and Delay Analysis for mixed real time and normal data traffic

IEEE Throughput and Delay Analysis for mixed real time and normal data traffic IEEE 802.11 Throughput and Delay Analysis for mixed real time and normal data traffic Matias Arenas P. and Walter Grote H. Department of Electronic Engineering, Federico Santa Maria Technical U. Avenida

More information

A SCHEME FOR IMPROVED DELAY AND FRAME DROP PROBABILITIES IN e NETWORKS

A SCHEME FOR IMPROVED DELAY AND FRAME DROP PROBABILITIES IN e NETWORKS A SCHEME FOR IMPROVED DELAY AND FRAME DROP PROBABILITIES IN 82.11e NETWORKS Daniel Fokum and Cory Beard School of Computing and Engineering, University of Missouri Kansas City 534 Robert H. Flarsheim Hall

More information

Maximum Traffic Scheduling and Capacity Analysis for IEEE High Data Rate MAC Protocol

Maximum Traffic Scheduling and Capacity Analysis for IEEE High Data Rate MAC Protocol Maximum Traffic Scheduling and Capacity Analysis for IEEE 80..3 High Data Rate MAC Protocol Yi-Hsien Tseng, Eric Hsiao-kuang Wu and Gen-Huey Chen Department of Computer Science and Information Engineering,

More information

QoS Traffic in Wireless LAN Overlapping Cells

QoS Traffic in Wireless LAN Overlapping Cells QoS Traffic in Wireless LAN Overlapping Cells Rastin Pries 1, Klaus Heck 2, Phuoc Tran-Gia 1, Thomas Wirth 1 1 University of Würzburg, Deptartment of Distributed Systems, Würzburg, Germany. e-mail: {pries

More information

Evaluation of the backoff procedure of Homeplug MAC vs. DCF

Evaluation of the backoff procedure of Homeplug MAC vs. DCF Evaluation of the backoff procedure of Homeplug MAC vs. DCF Cristina Cano and David Malone Hamilton Institute National University of Ireland, Maynooth Co. Kildare, Ireland Email: {cristina.cano,david.malone}@nuim.ie

More information

Enhanced Fair Scheduling for IEEE e Wireless LANs *

Enhanced Fair Scheduling for IEEE e Wireless LANs * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 23, 1707-1721 (2007) Enhanced Fair Scheduling for IEEE 802.11e Wireless LANs * KUN-NAN TSENG, KUOCHEN WANG + AND HUNG-CHENG SHIH Department of Computer Science

More information

A New Framework For Qos Provisioning In Wireless Lans Using The P-persistent Mac Protocol

A New Framework For Qos Provisioning In Wireless Lans Using The P-persistent Mac Protocol University of Central Florida Electronic Theses and Dissertations Doctoral Dissertation (Open Access) A New Framework For Qos Provisioning In Wireless Lans Using The P-persistent Mac Protocol 2010 Kiran

More information

IEEE e/802.11k wireless LAN: spectrum awareness for distributed resource sharing

IEEE e/802.11k wireless LAN: spectrum awareness for distributed resource sharing WIRELESS COMMUNICATIONS AND MOBILE COMPUTING Wirel. Commun. Mob. Comput. 2004; 4:881 902 Published online in Wiley InterScience (www.interscience.wiley.com). DOI: 10.1002/wcm.261 IEEE 802.11e/802.11k wireless

More information

Two-phase Collision Avoidance to Improve Scalability in Wireless LANs

Two-phase Collision Avoidance to Improve Scalability in Wireless LANs Two-phase Collision Avoidance to Improve Scalability in Wireless LANs Seongil Han, Yongsub Nam, Yongho Seok, Taekyoung Kwon and Yanghee Choi School of Computer Science and Engineering Seoul National University,

More information

A Finite State Model for IEEE Wireless LAN MAC DCF

A Finite State Model for IEEE Wireless LAN MAC DCF First International Conference on Emerging Trends in Engineering and Technology A Finite State Model for IEEE 802.11 Wireless LAN MAC DCF Dillip Kumar Puthal and Bibhudatta Sahoo Department of Computer

More information